TCG. TCG Infrastructure Working Group Security Qualities Schema. TCG PUBLISHED Copyright TCG 2007

Size: px
Start display at page:

Download "TCG. TCG Infrastructure Working Group Security Qualities Schema. TCG PUBLISHED Copyright TCG 2007"

Transcription

1 TCG Infrastructure Working Group Security Qualities Schema Revision 7 21 May 2007 Published Contacts: admin@trustedcomputinggroup.org Copyright TCG 2007 TCG

2 Copyright 2007 Trusted Computing Group, Incorporated. Disclaimer THIS SPECIFICATION IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification and to the implementation of this specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages, whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this specification or any information herein. No license, express or implied, by estoppel or otherwise, to any TCG or TCG member intellectual property rights is granted herein. Except that a license is hereby granted by TCG to copy and reproduce this specification for internal use only. Contact the Trusted Computing Group at for information on specification licensing through membership agreements. Any marks and brands contained herein are the property of their respective owners. Revision 7 Published Page ii of 31

3 IWG Document Roadmap Acknowledgement The TCG wishes to thank all those who contributed to this specification. This document builds on considerable work done in the various working groups in the TCG. Revision 7 Published Page 3 of 31

4 Special thanks to the members of the IWG contributing to this document: Malcolm Duncan Kazuaki Nimura Diana Arroyo Lee Terrell Ned Smith (IWG co-chair) Sandi Roddy Wyllys Ingersoll Jeff Nisewanger Paul Sangster (Editor) Thomas Hardjono (IWG co-chair) Greg Kazmierczak Len Veil CESG Fujitsu Limited IBM IBM Intel NSA Sun Microsystems Sun Microsystems Symantec Corporation Wave Systems Wave Systems Wave Systems Revision 7 Published Page 4 of 31

5 Table of Contents 1 Scope and Audience Introduction Normative Specification Content Schema Version Schema Namespace Dependent Schema Definitions W3C XML Schema Syntax W3C XML-Signature Syntax TCG Core Integrity Schema Syntax Schema Diagrams Conventions Keywords Security Qualities Schema Complex Types and Elements complextype AdditionalInfoType complextype CommonCriteriaType element CommonCriteriaType/AssuranceLevel element CommonCriteriaType/ProfileLocation element CommonCriteriaType/TargetLocation element CommonCriteriaType/VerificationReport element CommonCriteriaType/CertificationBody element CommonCriteriaType/AdditionalInfo complextype FipsLevelType element FipsLevelType/SecurityPolicy element FipsLevelType/TestReport element FipsLevelType/TestingLab element FipsLevelType/AdditionalInfo complextype Iso9000Type element Iso9000Type/AdditionalInfo complextype TPMSecurityAssertionsType complextype TBBSecurityAssertionsType complextype SecurityQualitiesType References Revision 7 Published Page 5 of 31

6 1 Scope and Audience This specification is integral to the TCG Infrastructure Working Group s (IWG) reference architecture, and is directly related to the TCG s Integrity Management Model. Specifically, the Security Qualities XML schema defines the structure with which claims about the security provided by a system can be asserted to other parties (e.g. relying parties.) Architects, designers, developers, and technologists interested in the development, deployment, and interoperation of trusted systems will find this document necessary in providing a specific mechanism for communicating integrity information. Revision 7 Published Page 6 of 31

7 2 Introduction This document defines the contents and format of the Security Qualities Schema. This schema is designed to be used within other schemas (such as the Reference Manifest schema [1]) to assert qualities of the component that might affect the verifier s decision making process about whether to trust the operation of the component. These qualities generally are not subject to direct (cryptographic) measurement so this allows the qualities to be asserted by a manufacturer and verified by relying parties in conjunction with component measurements. The goal of this schema is to house security qualities which are associated with a component. For example, this allows for the creation of a single Reference Manifest to assert that a particular TPM (specific: make, model, firmware version) has been Common Criteria evaluated and describe the circumstances and results of the review. This manifest containing the assertions could be referenced by each platform that includes this TPM and thus asserts to offer the security qualities. These assertions are designed to be associated with a Reference Manifest using the AssertionInfo element. While this schema intends to offer a rich set of information that might reflect the quality and thus trustworthiness of a component, it is expected that deployers may wish to associate a different set of information. This is possible using the AdditionalInfo element described below or by including a custom assertion schema (instead of this one) on the Reference Manifest s AssertionInfo element. Version 1.1 of this specification includes assertions made about the TPM and TBB in the TCG Credentials 1.0 specification[9]. This enables the security qualities schema to contain all of the assertions previously made in the credentials thus allowing for credentials to assert qualities by reference to an XML document based on this schema. Specifically, version 1.1 of this document adds the TPMSecurityAssertionsType and TBBSecurityAssertionsType complex types. 2.1 Normative Specification Content The contents of this document should be considered to be NORMATIVE except for the XML schemas and associated structural s. For XML schemas, the XML in this document is generated from the XSD files. While it is the intention of the authors to keep these representations consistent, the XSD files are considered NORMATIVE for all XML and any XML representations in this document are INFORMATIVE. 2.2 Schema Version The Security Qualities schema s version number is defined using the version attribute of the schema s root-level schema element: version= version_number This document refers to version 1.10 of the Security Qualities schema. 2.3 Schema Namespace The Security Qualities schema s is defined using the targetnamespace attribute of the schema s root-level schema element: targetnamespace= The schema s reflects the schema version, and is currently defined as follows: 1_1# Revision 7 Published Page 7 of 31

8 2.4 Dependent Schema Definitions W3C XML Schema Syntax The Security Qualities schema relies upon data structures defined by the World Wide Web Consortium s (W3C) XML-Schema syntax. Consequently, the Reference Manifest schema imports the W3C s XML schema with the following : The Security Qualities schema associates the abovementioned schema with the xs prefix W3C XML-Signature Syntax The Security Qualities schema relies upon data structures defined by the World Wide Web Consortium s (W3C) XML-Signature digital signature syntax. Consequently, the Security Qualities schema imports the W3C s digital signature XML schema with the following : The Security Qualities schema associates the abovementioned schema with the ds prefix TCG Core Integrity Schema Syntax This Security Qualities schema relies upon data structures defined by the TCG Core Integrity Schema Syntax, [1]. Consequently, this schema imports the TCG Core Integrity Schema with the following : _0_1# The Security Qualities schema associates the above mentioned schema with the core prefix Schema Diagrams Conventions The schema s in this specification contain and elements that are either mandatory or optional to populate. Those that are mandatory to populate are depicted by solid lines surrounding the and elements. Those that are optional to populate are depicted by dashed lines surrounding the and elements Keywords The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in RFC 2119 [11]. This specification does not distinguish blocks of informative comments and normative requirements. Therefore, for the sake of clarity, note that lower case instances of must, should, etc. do not indicate normative requirements. Revision 7 Published Page 8 of 31

9 3 Security Qualities Schema schema location: attribute form default: element form default: targetnamespace: unqualified qualified The following are the complex types defined within this specification. Elements SecurityQualities Complex types AdditionalInfoType CommonCriteriaType FipsLevelType Iso9000Type SecurityQualitiesType TBBSecurityAssertionsType TPMSecurityAssertionsType 3.1 Complex Types and Elements complextype AdditionalInfoType The AdditionalInfo complex type provides a generic structure for pointing to a web document describing a security property that is embodied by the associated component. For example, this enables a manufacturer to associate a security property with a component (software, firmware or hardware) not covered by the other complex types described in this schema. Similarly, this type may be used by an IT department or any other party in the supply or deployment chain to bind information that might reflect the quality or trustworthiness of the component (e.g. IT compliance report.) The AdditionalInfo type includes a generic URI that points to the document describing the security qualities asserted by the documents creator and a set of hash values of the document enabling relying parties to detect if the document is identical to the version when this assertion was created. The support for multiple hash values was included to allow for multiple digest algorithms to be used in parallel (e.g. URI s content is digested both in SHA-1 and SHA-256.) Finally a description of the quality can be included to aid a verifier s understanding of the context of the generic quality being asserted. Revision 7 Published Page 9 of 31

10 Diagram type properties children used by extension of core:hasheduritype base UriHash core:hasheduritype elements CommonCriteriaType/AdditionalInfo FipsLevelType/AdditionalInfo Iso9000Type/AdditionalInfo SecurityQualitiesType/AdditionalInfo CommonCriteriaType/CeritficationBody CommonCriteriaType/ProfileLocation CommonCriteriaType/TargetLocation CommonCriteriaType/VerificationReport Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional Detail UriValue Reference to a web document describing the security quality to be associated with the component. Textual description of the context of the security quality asserted in the document to aid the verifier s understand of this generic field. This allows humans involved in the trust decision to understand the role of the document referenced by the URI since this can point to a wide range of types of documents XML <xs:complextype name="additionalinfotype"> <xs:complexcontent> <xs:extension base="core:hasheduritype"> <xs:attribute name="" type="xs:string"/> </xs:extension> </xs:complexcontent> </xs:complextype> Revision 7 Published Page 10 of 31

11 3.1.2 complextype CommonCriteriaType The CommonCriteriaType complex type is a collection of information describing the security aspects ( qualities ) of the associated component involved in a common criteria evaluation. This allows manufacturers to assert whether the component s evaluation was completed, is currently in progress or was built consistent with the evaluation criteria but no evaluation has occurred and any details associated with the process. For example, this type might contain references to the protection profile applied, evaluation results and the available supporting documentation which provides the context for how the component operates within the evaluated configuration. Information about the certifying body is included in case their sphere of influence affects the trust decisions. For more information on the common criteria evaluation process see [7] Diagram children used by Detail AssuranceLevel ProfileLocation TargetLocation VerificationReport CeritficationBody AdditionalInfo element SecurityQualitiesType/CommonCriteria Name Type Use Default Fixed Version xs:normalizedstring required EvaluationStatus xs:nmtoken required CertificationDate xs:date optional Revision 7 Published Page 11 of 31

12 Version EvaluationStatus CertificationDate Version of the common criteria evaluation process used [6]. For example, version 2.3 of the common criteria process [7] is currently being used at the writing of this specification but version 3.1 was recently released so this value describes which version of the process was applied to the product evaluation. Current status of the component as it progresses through the common criteria evaluation process (even if the component was merely designed to meet the criteria but isn t actually being evaluated.) This attribute allows for asserting that a product was: designed to meet (but not evaluated), currently being evaluated, or has completed evaluation and received the asserted assurance level. Date when product received its common criteria evaluation. This attribute should only be included when Evaluation Status is EvaluationCompleted XML <xs:complextype name="commoncriteriatype"> <xs:sequence> <xs:element name="assurancelevel"> <xs:complextype> <xs:simplecontent> <xs:extension base="xs:integer"> <xs:attribute name="strengthoffunction" use="optional"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="basic"/> <xs:enumeration value="medium"/> <xs:enumeration value="high"/> </xs:restriction> </xs:simpletype> </xs:attribute> <xs:attribute name="plus" type="xs:boolean"/> </xs:extension> </xs:simplecontent> </xs:complextype> </xs:element> <xs:element name="profilelocation" type="additionalinfotype" minoccurs="0"/> <xs:element name="targetlocation" type="additionalinfotype" minoccurs="0"/> <xs:element name="verificationreport" type="additionalinfotype" minoccurs="0"/> <xs:element name="certificationbody" type="additionalinfotype" minoccurs="0"/> <xs:element name="additionalinfo" type="additionalinfotype" minoccurs="0"/> </xs:sequence> <xs:attribute name="version" type="xs:normalizedstring" use="required"/> <xs:attribute name="evaluationstatus" use="required"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="designedtomeet"/> <xs:enumeration value="evaluationinprogress"/> <xs:enumeration value="evaluationcompleted"/> </xs:restriction> </xs:simpletype> </xs:attribute> <xs:attribute name="certificationdate" type="xs:date"/> </xs:complextype> element CommonCriteriaType/AssuranceLevel This element captures the result (or anticipated result) of the Common Criteria evaluation. The result contains an overall assurance level that the evaluator believed the component achieved. This value reflects only the numeric portion of the EAL expression and must be within a range of 1 to 7 inclusive. For example, a component might achieve an EAL4 assurance level (represented as just a 4 in the AssuranceLevel element.) If the assurance level received is EAL4+ this would also require the use of the Plus boolean attribute. Revision 7 Published Page 12 of 31

13 type properties extension of xs:integer Detail isref 0 content complex Name Type Use Default Fixed StrengthOfFunction xs:nmtoken optional Plus xs:boolean optional StrengthOfFunction Plus Level of robustness of the function of the component (e.g. medium.) If the evaluation result includes a strength of function, then it must be expressed using this attribute. If this attribute is not expressed, then the verifier should assume that no such strength of function was part of the evaluation result. Additional indicator that the product went beyond the indicated assurance level XML <xs:element name="assurancelevel"> <xs:complextype> <xs:simplecontent> <xs:extension base="xs:integer"> <xs:attribute name="strengthoffunction" use="optional"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="basic"/> <xs:enumeration value="medium"/> <xs:enumeration value="high"/> </xs:restriction> </xs:simpletype> </xs:attribute> <xs:attribute name="plus" type="xs:boolean"/> </xs:extension> </xs:simplecontent> </xs:complextype> </xs:element> element CommonCriteriaType/ProfileLocation This element is a reference to the location of the protection profile description. The protection profile describes the security context which the component was evaluated against in a nonproduct specific manner. In order to prevent tampering with the protection profile description, this element includes a cryptographic hash of its contents. Verifiers can use this to detect changes to the profile after this assertion was generated (e.g. possibly including additional security properties that were not part of this evaluation) that potentially affect its trust decision. Revision 7 Published Page 13 of 31

14 type properties children AdditionalInfoType isref 0 content complex UriHash Detail Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue Location of the protection profile document expressed in URI format. Human readable description of the referenced protection profile document XML <xs:element name="profilelocation" type="additionalinfotype" minoccurs="0"/> element CommonCriteriaType/TargetLocation This element references the security target document used as the basis of the evaluation of the component. This document normally covers the security characteristics of the component being evaluated including important information about the security requirements met by the component and how the component may be used and remain within the context of the Common Criteria evaluation. While the security target is normally specific to a particular vendor s component, it frequently is based upon or references a product neutral protection profile when an appropriate profile exists. This document is commonly made available and contains information essential to the verifier s understanding of the security provided by the component. Revision 7 Published Page 14 of 31

15 type properties children AdditionalInfoType isref 0 content complex UriHash Detail Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue URI formatted reference to the security target (unstructured) document. This is available for humans to consider whether the intended use of the component is consistent with its evaluation. The result of this consideration might be stored by a verifier to avoid repeated human intervention when the same component is used in future transactions. Human readable description of the security target document being referenced XML <xs:element name="targetlocation" type="additionalinfotype" minoccurs="0"/> element CommonCriteriaType/VerificationReport This element provides a reference to a document known as a Certification or Verification Report that describes in more detail the context of the component s evaluation and the final results. Since the verifier should consider these detailed findings (in conjunction with the security target), it is important that the integrity of the report be protected from change after the assertion reference is created (e.g. to detect an adversary including false results.) The included hash(es) allows the verifier to detect changes in the document. Revision 7 Published Page 15 of 31

16 type properties children AdditionalInfoType isref 0 content complex UriHash Detail Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue URI formatted reference to the verification report created by the certifying body as a result of the evaluation. The verification report is an unstructured document intended to be consumed by a human. The contents may affect the level of confidence a verifier has in the use of this type of component. Human readable Information about the verification report referenced by UriValue XML <xs:element name="verificationreport" type="additionalinfotype" minoccurs="0"/> Revision 7 Published Page 16 of 31

17 3.1.7 element CommonCriteriaType/CertificationBody This element references information about the certification body that performed the evaluation as per the rules of the Common Criteria process. Depending on the country of operation of the verifier, the country associated with the certifying body and the resulting assurance level may affect its trustworthiness. For example, assurance levels above EAL4+ may not be recognized by verifiers in countries outside of the nation which performed the evaluation. type properties children Detail AdditionalInfoType isref 0 content complex UriHash Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue URI formatted location of a web page or document which describes the certifying body which performed the evaluation of the component. Human readable description of the document referenced by UriValue XML <xs:element name="certificationbody" type="additionalinfotype" minoccurs="0"/> element CommonCriteriaType/AdditionalInfo This element provides for a general description of information about the component s common criteria evaluation process or results. For example, this might include a reference to an on-line certificate image issued by a member of the International Common Criteria Mutual Recognition Arrangement (ICCMRA.) Because this element is generic it is particularly beneficial to include a human readable description of the purpose of the reference within this type. This element should Revision 7 Published Page 17 of 31

18 not be used for referencing information applicable to one of the other elements of CommonCriteriaType complex type. type properties children Detail AdditionalInfoType isref 0 content complex UriHash Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue URI formatted reference to a web page or document describing some aspect of the evaluation or result not associated with one of the other elements of CommonCriteriaType. Human readable description of the purpose of the referenced document. Because this is a general purpose reference this description is particularly helpful for the person reviewing the evaluation qualities XML <xs:element name="additionalinfo" type="additionalinfotype" minoccurs="0"/> complextype FipsLevelType This element captures the results of a NIST FIPS evaluation of the component. Such an evaluation may focus on the security boundary of the cryptography included in the component (e.g. FIPS 140.) This schema is designed to capture information about the overall result (Level), the lab performing the test (TestLab), the security properties asserted by the component s vendor (SecurityPolicy) and which of these properties were observed by the testing lab (TestReport.) In the FIPS world, the independent verification testing labs are accredited by the CMT (Cryptographic Module Testing) laboratories of the US NIST (National Institute for Standards and Technology) and the Canadian CSE (Communications Security Establishment.) to perform the testing of the security policies and to generate a test report. This report forms the basis for Revision 7 Published Page 18 of 31

19 determining if the component meets the requirements for a certification. This type allows for each of these documents and entities to be defined so that a verifier may factor this information into its decision. children used by AdditionalInfo SecurityPolicy TestReport TestingLab element Detail SecurityQualitiesType/FipsLevel Name Type Use Default Fixed Specification xs:normalizedstring required Level xs:integer required Specification Level Identification of which FIPS standards was applied for the evaluation. It s envisioned that this would be used for at least representing FIPS 140 evaluations. For example, this attribute might be Result of the FIPS evaluation (e.g. Level 2 would be represented as just 2.) This value must be in the inclusive range of 1-4 which are the recognized evaluation levels for FIPS and products XML <xs:complextype name="fipsleveltype"> <xs:sequence minoccurs="0"> <xs:element name="additionalinfo" type="additionalinfotype"/> <xs:element name="securitypolicy" type="additionalinfotype"/> <xs:element name="testreport" type="additionalinfotype"/> <xs:element name="testinglab" type="additionalinfotype"/> </xs:sequence> <xs:attribute name="specification" type="xs:normalizedstring" use="required"/> <xs:attribute name="level" use="required"> <xs:simpletype> <xs:restriction base="xs:integer"/> </xs:simpletype> </xs:attribute> </xs:complextype> Revision 7 Published Page 19 of 31

20 element FipsLevelType/SecurityPolicy This element provides a reference to the Security Policy document associated with the component. This document describes the proper operation and environment for use of the component and the (normally) vendor claimed security properties exhibited. This document is useful to the verifier to understand how the component should be used within a platform and thus may factor this information into the trust decision when evaluating how the component is in fact being used by the other party (e.g. how its described within a Verification Report.) It is not envisioned that this level of detail will be required for all verifiers and some vendors may not wish to publish such a document so this element is left optional in the schema. type properties children AdditionalInfoType isref 0 content complex UriHash Name Type Use Default Fixed Annotation UriValue xs:anyuri required xs:string optional Detail UriValue URI formatted reference to the Security Policy document. This includes information potentially useful to the verifier to understand the claimed security properties of the component. Human readable description of the referenced Security Policy document. This is useful to humans involved with the verification process attempting to analyze the trustworthiness of a component XML <xs:element name="securitypolicy" type="additionalinfotype"/> Revision 7 Published Page 20 of 31

21 element FipsLevelType/TestReport This element provides a protected reference to the final verification test report by the NVLAP accredited lab describing the testing performed and the results observed. This report includes a lot of detail that might be of interest to sophisticated verifiers who wish more information then the overall result (whether it passed and the achieved level.) type properties children AdditionalInfoType isref 0 content complex UriHash Name Type Use Default Fixed Annotation UriValue xs:anyuri required xs:string optional Detail UriValue XML URI formatted reference to the test report associated with the associated component. Human readable description of the test results document. This is useful to humans involved with the verification process attempting to analyze the trustworthiness of a component. <xs:element name="testreport" type="additionalinfotype"/> element FipsLevelType/TestingLab This element includes a reference to a document describing the NVLAP accredited CMT lab involved with the certification of this component. This information might be useful for verifiers that do not wish to trust equally all of the accredited labs findings (e.g. for geo-political reasons) despite the NIST/CVE issuing the certification of the component. Revision 7 Published Page 21 of 31

22 type properties children AdditionalInfoType isref 0 content complex UriHash Name Type Use Default Fixed Annotation UriValue xs:anyuri required xs:string optional Detail UriValue XML URI formatted reference to an available document describing the laboratory that performed the validation testing on the component. Human readable description of the purpose of the referenced document. This is useful to humans involved with the verification process attempting to analyze the trustworthiness of a component. <xs:element name="testinglab" type="additionalinfotype"/> element FipsLevelType/AdditionalInfo This element allows for the association of other information about the FIPS evaluation not covered by the other FIPS-related elements. This enables a reference to be included to a document describing more information about the evaluation process, result or environmental constraints necessary to sustain the evaluation rating. Another possible use of this type would be to directly reference an on-line copy of the physical certificate issued by NIST for this component. Revision 7 Published Page 22 of 31

23 type properties children AdditionalInfoType isref 0 content complex UriHash Detail Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue URI formatted reference to an available document describing some aspect of the FIPS evaluation process of the component. Human readable description of the purpose of the referenced document. This is useful to humans involved with the verification process attempting to analyze the trustworthiness of a component XML <xs:element name="additionalinfo" type="additionalinfotype"/> complextype Iso9000Type This complex type describes the type of ISO 9000 [8] conformance and evaluation that was performed on the component s design and development environment and whether it was considered compliant. Revision 7 Published Page 23 of 31

24 children used by AdditionalInfo element Detail SecurityQualitiesType/Iso9000 Name Type Use Default Fixed SpecName xs:nmtoken required IsCompliant xs:boolean optional SpecName IsCompliant Name (including year version) of the ISO 9000 specification which was used as the basis for the evaluation of the environment used to design and build the component. For example, this could be represented as ISO 9000:2000 if this version of the ISO 9000 specification was used. Boolean result of whether the environment used to design and build the component met the associated ISO 9000 criteria XML <xs:complextype name="iso9000type"> <xs:sequence minoccurs="0"> <xs:element name="additionalinfo" type="additionalinfotype"/> </xs:sequence> <xs:attribute name="specname" type="xs:nmtoken" use="required"/> <xs:attribute name="iscompliant" type="xs:boolean"/> </xs:complextype> element Iso9000Type/AdditionalInfo This element allows for the addition of information not described by the other elements tied to ISO 9000 evaluation above. This might include information about the ISO 9000 compliance process that was the focus on the evaluation and information about the results of the evaluation including when it took place and how often re-evaluations are expected to occur. type properties children AdditionalInfoType isref 0 content complex UriHash Revision 7 Published Page 24 of 31

25 Detail Name Type Use Default Fixed UriValue xs:anyuri required xs:string optional UriValue URI formatted reference to a document describing more information about the application of the ISO 9000 evaluation processes or results associated with the component. Human readable description of the referenced document XML <xs:element name="additionalinfo" type="additionalinfotype"/> complextype TPMSecurityAssertionsType This complex type describes the security assertions typically made about the TPM within the TCG Credentials specification version 1.0. These assertions describe properties of how the EK was created and whether it can be upgraded in the field. type properties TPMSecurityAssertionsType isref 0 content complex Name Type Use Default FieldUpgradable xs:boolean Optional EKGenerationType xs:nmtoken Optional EKGenerationLocation xs:nmtoken Optional EKCertificateGenerationLocation xs:nmtoken Optional Detail FieldUpgradable Indicates whether the TPM is capable of being field upgraded. Revision 7 Published Page 25 of 31

26 EKGenerationType EKGenerationLocation EKCertificateGenerationLocation Describes whether the EK (key pair) was generated inside the TPM (INTERNAL) or externally and injected (INJECTED) into the TPM. This type also indicates whether the EK can be revoked should it be potentially exposed. Referring to the XML for the enumeration values, those values with REVOCABLE is their name also represent that the EK is revocable (INJECTEDREVOCABLE means the EK was generated externally and injected into the TPM and the EK can be revoked if necessary.) If the EKGenerationLocation is not TPMMANUFACTURER, then EKGenerationType SHOULD NOT be INJECTED or INJECTEDREVOCABLE as the TPM normally wouldn t offer a capability to inject this late in the supply chain. Asserts the party within the supply chain which created the EK. The specific parties enumerated include: the TPM manufacturer, Platform Manufacturer, and Owner (possibly IT department or other parties late in the supply chain) who might be identified by their issuer name in the EK Certificate. Generally an EK created earlier in the supply chain is considered more trustworthy (for instance the TPM manufacturer is most familiar with the part and likely controls access to it during manufacturing) so a verifier might be interested in this information. This is analogous to the EKGenerationLocation however asserts when in the supply chain the EK Certificate was issued. The enumeration values are the same as above except the TRUSTED3RDPARTY is added to recognize when a 3 rd party (like a Privacy CA) is used by a deployment to issue the EK Certificate. The EK Certificate can be issued at a time much later in the supply chain then when the EK key pair are created and thus be done by a different party (e.g. IT) or might not be issued at all XML <xs:complextype name="tpmsecurityassertionstype"> <xs:attribute name="fieldupgradable" type="xs:boolean"/> <xs:attribute name="ekgenerationtype"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="injectedrevocable"/> <xs:enumeration value="internalrevocable"/> <xs:enumeration value="injected"/> <xs:enumeration value="internal"/> </xs:restriction> </xs:simpletype> </xs:attribute> <xs:attribute name="ekgenerationlocation"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="tpmmanufacturer"/> <xs:enumeration value="platformmanufacturer"/> <xs:enumeration value="owner"/> </xs:restriction> </xs:simpletype> </xs:attribute> <xs:attribute name="ekcertificategenerationlocation"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="tpmmanufacturer"/> <xs:enumeration value="platformmanufacturer"/> <xs:enumeration value="owner"/> <xs:enumeration value="trusted3rdparty"/> </xs:restriction> </xs:simpletype> </xs:attribute> Revision 7 Published Page 26 of 31

27 </xs:complextype> complextype TBBSecurityAssertionsType This complex type describes the security assertions typically made about the TBB (includes the platform chipset) within the TCG Credentials specification version 1.0. These assertions describe the security capabilities of the platform. For instance, an OEM might assert that the platform is capable of dynamically invoking the RTM. type properties TBBSecurityAssertionsType isref 0 content complex Name Type Use Default Fixed TPMBinding xs:nmtoken Optional MeasurementRootType xs:unsignedint Optional Detail This enumeration indicates how the TPM is associated (or bound) to the platform. Frequently the TPM is physically attached to the platform (e.g. soldered) or is integrated within a platform component (e.g. gates in a CPU) which is considered a 1 physical. TPMBinding The TPM may be logically bound to the platform possibly using cryptographic techniques to prove the linkage. If this approach is used to associate the TPM to the TBB, this is considered a 2 logical. Another type of TPM binding is virtual where the TPM might be implemented in software and is associated with the other trusted roots via virtualization techniques. This is considered a 3 virtualized. MeasurementRootType If this document creator is unsure of the binding technique used, this attribute should not be asserted. Bitmap indicating properties of the Root of Trust for Measurement (RTM) and how it is instantiated on this platform. This attribute is a bitmap recognizing that a single platform may support multiple types of measurement roots. The currently defined bit definitions (from the least significant bit) are: 1 static, 2 dynamic, 3 nonhost, bits 4-32 are reserved for future use. The static and dynamic bits refer to whether the CRTM can be invoked at the start of the boot sequence (static) and/or whether it may be started later after the operating system has starting running (dynamic.) Revision 7 Published Page 27 of 31

28 The nonhost bit indicates the RTM executes within a component on the system other than the main CPU. For example, nonhost might be a service processor as described by the PC Client specification. If the document creator has knowledge that the platform does not have a measurement root, it SHOULD set this value to 0 to indicate none present. If the creator is unaware of what type of root is present in the platform, it SHOULD NOT include this attribute. The reserved bits SHOULD be set to 0 and MUST be ignored by verifiers XML <xs:complextype name="tbbsecurityassertionstype"> <xs:attribute name="tpmbinding"> <xs:simpletype> <xs:restriction base="xs:nmtoken"> <xs:enumeration value="physical"/> <xs:enumeration value="logical"/> <xs:enumeration value="virtual"/> </xs:restriction> </xs:simpletype> </xs:attribute> <xs:attribute name="measurementroottype"> <xs:simpletype> <xs:restriction base="xs:unsignedint"> <xs:enumeration value="1"/> <xs:enumeration value="2"/> <xs:enumeration value="4"/> </xs:restriction> </xs:simpletype> </xs:attribute> </xs:complextype> complextype SecurityQualitiesType This type allows for the definition of the security properties asserted to be associated with the component. These qualities generally can not be measured by hashing some aspect of the component and must be asserted by a trustworthy party. This type houses a wide variety of types of security properties (qualities) generally associated with processes and results tied to an evaluation of the component performed by a trusted, widely recognized 3rd party and assertions about un-measurable properties of the TPM and TBB. Revision 7 Published Page 28 of 31

29 children used by TPMSecurityAssertions TBBSecurityAssertions CommonCriteria FipsLevel Iso9000 AdditionalInfo DigestMethod Transforms element SecurityQualities Detail None XML <xs:complextype name="securityqualitiestype"> <xs:sequence> <xs:element name="tpmsecurityassertions" type="tpmsecurityassertionstype" minoccurs="0" maxoccurs="unbounded"/> <xs:element name= TBBSecurityAssertions type= TBBSecurityAssertionsType minoccurs= 0 maxoccurs= unbounded /> <xs:element name="commoncriteria" type="commoncriteriatype" minoccurs="0" maxoccurs="unbounded"/> <xs:element name="fipslevel" type="fipsleveltype" minoccurs="0" maxoccurs="unbounded"/> Revision 7 Published Page 29 of 31

30 <xs:element name="iso9000" type="iso9000type" minoccurs="0" maxoccurs="unbounded"/> <xs:element name="additionalinfo" type="additionalinfotype" minoccurs="0" maxoccurs="unbounded"/> <xs:element name="digestmethod" type="core:digestmethodtype" minoccurs="0" maxoccurs="unbounded"/> <xs:element name="transforms" type="core:transformmethodtype" minoccurs="0" maxoccurs="unbounded"/> </xs:sequence> </xs:complextype> Revision 7 Published Page 30 of 31

31 4 References [1] Trusted Computing Group, TCG IWG Reference Manifest Schema, Specification Version 1.0, Revision 0.8, November 2006, cation_v1.0.pdf [2] Trusted Computing Group, TCG IWG Core Integrity Schema, Specification Version 1.0, Revision 1.0, November 2006, v1.0.1.pdf [3] W3C, XML Schema, W3C Consortium, October [4] National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 140-1, January, [5] National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication 140-2, May, [6] Common Criteria, Common Criteria evaluation process information portal, [7] Common Criteria, Common Criteria for Information Security Technology Evaluation, August [8] International Organization for Standardization, ISO 9000 / ISO Portal. [9] Trusted Computing Group, TCG Credentials Profile, Specification Version 1.0, January 2006, [10] Security Qualities Schema Specification, Version 1.0, Rev ion_v1.0.pdf Revision 7 Published Page 31 of 31

ERRATA FOR. TCG Platform Attribute Credential Profile. Errata Version Published. Specification Version 1.0 Revision January 2018

ERRATA FOR. TCG Platform Attribute Credential Profile. Errata Version Published. Specification Version 1.0 Revision January 2018 ERRATA Errata Version 1.0 2018-02-05 Published FOR TCG Platform Attribute Credential Profile Specification Version 1.0 Revision 16 16 January 2018 Contact: admin@trustedcomputinggroup.org Copyright TCG

More information

TCG. TCG Credential Profiles TCG PUBLISHED. Specification Version 1.1 Revision May 2007 For TPM Family 1.2; Level 2 Published

TCG. TCG Credential Profiles TCG PUBLISHED. Specification Version 1.1 Revision May 2007 For TPM Family 1.2; Level 2 Published s Specification Version 1.1 Revision 1.014 21 May 2007 For TPM Family 1.2; Level 2 Published Contact: admin@trustedcomputinggroup.org Copyright TCG 2007 TCG Credential Profile Copyright 2007 Trusted Computing

More information

FOR TCG ACPI Specification

FOR TCG ACPI Specification ERRATA Errata Version 0.3 August 25, 2017 FOR TCG ACPI Specification Specification Version 1.20 Revision 8 January 19th, 2017 Contact: admin@trustedcomputinggroup.org Copyright TCG 2017 Disclaimers, Notices,

More information

TCG. TCG Credential Profiles For TPM Family 1.2; Level 2 TCG PUBLISHED. Specification Version 1.2 Revision 8 3 July 2013 Published

TCG. TCG Credential Profiles For TPM Family 1.2; Level 2 TCG PUBLISHED. Specification Version 1.2 Revision 8 3 July 2013 Published TCG Credential Profiles For TPM Family 1.2; Level 2 Specification Revision 8 3 July 2013 Published Contact: admin@trustedcomputinggroup.org TCG TCG PUBLISHED Copyright TCG 2013 Copyright 2012 Trusted Computing

More information

TCG Credential Profiles. Specification Version 1.0 Revision January 2006 For TPM Family 1.2; Level 2 TCG

TCG Credential Profiles. Specification Version 1.0 Revision January 2006 For TPM Family 1.2; Level 2 TCG s Specification Version 1.0 Revision 0.981 18 January 2006 For TPM Family 1.2; Level 2 TCG TCG PUBLISHED Copyright Trusted Computing Group 2006 Credential Profile Copyright 2006 Trusted Computing Group,

More information

TCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011

TCG. TCG Certification Program. TNC Certification Program Suite. Document Version 1.1 Revision 1 26 September 2011 TCG Certification Program TNC Certification Program Suite Document Version 1.1 Revision 1 26 September 2011 Contact: admin@trustedcomputinggroup.org TCG TCG PUBLISHED Copyright TCG 2009-2011 Copyright

More information

ERRATA FOR. TCG TPM I2C Interface Specification. Errata Version 1.0 April 6, Family 2.0 Level 00 Revision 1.

ERRATA FOR. TCG TPM I2C Interface Specification. Errata Version 1.0 April 6, Family 2.0 Level 00 Revision 1. ERRATA Errata Version 1.0 April 6, 2017 FOR TCG TPM I2C Interface Specification Family 2.0 August 05, 2016 Contact: admin@trustedcomputinggroup.org Copyright TCG 2003-2017 Disclaimers, Notices, and License

More information

Level of Assurance Authentication Context Profiles for SAML 2.0

Level of Assurance Authentication Context Profiles for SAML 2.0 2 3 4 5 Level of Assurance Authentication Context Profiles for SAML 2.0 Draft 01 01 April 2008 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Specification URIs: This

More information

ERRATA FOR. Protection Profile PC Client Specific TPM. Errata Version 1.0 June 16, 2018 DRAFT. Specification Version 1.

ERRATA FOR. Protection Profile PC Client Specific TPM. Errata Version 1.0 June 16, 2018 DRAFT. Specification Version 1. ERRATA Errata Version 1.0 June 16, 2018 DRAFT FOR Protection Profile PC Client Specific TPM June 16, 2018 Contact: admin@trustedcomputinggroup.org Copyright TCG 2003-2018 Disclaimers, Notices, and License

More information

TCG Storage Work Group. Storage Certification Program. Program Version 1.0 Document Revision 1.22 March 16, Contact: Doug Gemmill, TCG CPM T C G

TCG Storage Work Group. Storage Certification Program. Program Version 1.0 Document Revision 1.22 March 16, Contact: Doug Gemmill, TCG CPM T C G TCG Storage Work Group Storage Certification Program Program Version 1.0 Document Revision 1.22 March 16, 2018 Contact: Doug Gemmill, TCG CPM T C G TCG Published Copyright TCG 2018 Copyright 2018 Trusted

More information

TCG Compliance TNC IF-MAP Metadata for Network Security Compliance Test Plan

TCG Compliance TNC IF-MAP Metadata for Network Security Compliance Test Plan TCG Compliance TNC IF-MAP Metadata for Network Security Compliance Test Plan 0 Revision 11 10 March 2011 Published Contact: admin@trustedcomputinggroup.org Copyright TCG 2006-2011 Copyright 2006-2011 Trusted

More information

Metadata for SAML 1.0 Web Browser Profiles

Metadata for SAML 1.0 Web Browser Profiles 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Metadata for SAML 1.0 Web Browser Profiles Working Draft 00, 12 November 2002 Document identifier: draft-sstc-saml-meta-data-00 Location:

More information

TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2

TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2 TCG Physical Security Interoperability Alliance IP Video Use Case 002 (PSI-UC-IPV002) Specification Version 1.0 Revision 0.2 Revision History Description Date By Version 1.0 Rev 0.1 Initial Draft August

More information

TCG Storage Opal SSC Feature Set: PSID. Specification Version 1.00 Revision August 5, Contact:

TCG Storage Opal SSC Feature Set: PSID. Specification Version 1.00 Revision August 5, Contact: TCG Storage Opal SSC Feature Set: PSID Revision 1.00 August 5, 2015 Contact: admin@trustedcomputinggroup.org TCG PUBLISHED Copyright TCG 2015 Copyright 2015 Trusted Computing Group, Incorporated. Disclaimers,

More information

TCG. TCG Infrastructure Working Group Integrity Report Schema. TCG Published Copyright TCG 2011

TCG. TCG Infrastructure Working Group Integrity Report Schema. TCG Published Copyright TCG 2011 TCG Infrastructure Working Group Integrity Report Schema Specification Version 2.0 Revision 5 August 24, 2011 PUBLISHED Contacts: admin@trustedcomputinggroup.org TCG Published Copyright TCG 2011 TCG Copyright

More information

[MS-MSL]: Mapping Specification Language File Format. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-MSL]: Mapping Specification Language File Format. Intellectual Property Rights Notice for Open Specifications Documentation [MS-MSL]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

XEP-0114: Jabber Component Protocol

XEP-0114: Jabber Component Protocol XEP-0114: Jabber Component Protocol Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ 2012-01-25 Version 1.6 Status Type Short Name Active Historical component This specification

More information

XEP-0104: HTTP Scheme for URL Data

XEP-0104: HTTP Scheme for URL Data XEP-0104: HTTP Scheme for URL Data Matthew Miller mailto:linuxwolf@outer-planes.net xmpp:linuxwolf@outer-planes.net 2004-01-20 Version 0.3 Status Type Short Name Deferred Standards Track N/A This document

More information

TCG. TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification. Specification Version 1.0 Revision November 2006 FINAL

TCG. TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification. Specification Version 1.0 Revision November 2006 FINAL TCG Infrastructure Working Group Reference Manifest (RM) Schema Specification Specification Version 1.0 Revision 1.0 17 November 2006 FINAL Contacts: thardjono@signacert.com (editor, co-chair) Ned.Smith@intel.com

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-MSL]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

XEP-0298: Delivering Conference Information to Jingle Participants (Coin)

XEP-0298: Delivering Conference Information to Jingle Participants (Coin) XEP-0298: Delivering Conference Information to Jingle Participants (Coin) Emil Ivov mailto:emcho@jitsi.org xmpp:emcho@jit.si Enrico Marocco mailto:enrico.marocco@telecomitalia.it xmpp:enrico@tilab.com

More information

XEP-0171: Language Translation

XEP-0171: Language Translation XEP-0171: Language Translation Boyd Fletcher mailto:boyd.fletcher@us.army.mil Keith Lirette mailto:keith.lirette@tridsys.com Daniel LaPrade mailto:dlaprade@echostorm.net Brian Raymond mailto:braymond@echostorm.net

More information

Intellectual Property Rights Notice for Open Specifications Documentation

Intellectual Property Rights Notice for Open Specifications Documentation [MS-SSISPARAMS-Diff]: Intellectual Property Rights tice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats,

More information

[MS-SSISPARAMS-Diff]: Integration Services Project Parameter File Format. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-SSISPARAMS-Diff]: Integration Services Project Parameter File Format. Intellectual Property Rights Notice for Open Specifications Documentation [MS-SSISPARAMS-Diff]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for

More information

saml requesting attributes v1.1 wd01 Working Draft January 2016 Standards Track Draft Copyright OASIS Open All Rights Reserved.

saml requesting attributes v1.1 wd01 Working Draft January 2016 Standards Track Draft Copyright OASIS Open All Rights Reserved. Standards Track Draft Copyright OASIS Open 2015. All Rights Reserved. Page 1 of 10 SAML v2.0 Protocol Extension for Requesting Attributes in AuthnRequest Version 1.1 Working Draft 02 19 January 2016 Technical

More information

Proposed Visual Document Signatures Profile of OASIS DSS

Proposed Visual Document Signatures Profile of OASIS DSS Proposed Visual Document Signatures Profile of OASIS DSS ARX Contribution 01, 7 August 2007 Document identifier: oasis-dss-profiles-visual-document-signatures-arx-01 Technical Committee: OASIS Digital

More information

R E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013

R E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013 R E F E R E N C E Trusted Multi-Tenant Infrastructure Work Group Use Cases Version 1.1 November 15, 2013 Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2011-2013 Disclaimers, Notices, and License

More information

Oracle Hospitality OPERA Web Self- Service Brochure Web Service Specification Version 5.1. September 2017

Oracle Hospitality OPERA Web Self- Service Brochure Web Service Specification Version 5.1. September 2017 Oracle Hospitality OPERA Web Self- Service Brochure Web Service Specification Version 5.1 September 2017 Copyright 1987, 2017, Oracle and/or its affiliates. All rights reserved. This software and related

More information

XEP-0033: Extended Stanza Addressing

XEP-0033: Extended Stanza Addressing XEP-0033: Extended Stanza Addressing Joe Hildebrand mailto:jhildebr@cisco.com xmpp:hildjj@jabber.org Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ 2017-01-11 Version

More information

Intel Cluster Ready Allowed Hardware Variances

Intel Cluster Ready Allowed Hardware Variances Intel Cluster Ready Allowed Hardware Variances Solution designs are certified as Intel Cluster Ready with an exact bill of materials for the hardware and the software stack. When instances of the certified

More information

TCG. TCG Platform Attribute Credential Profile. TCG Published Copyright TCG Specification Version 1.0 Revision January 2018 Published

TCG. TCG Platform Attribute Credential Profile. TCG Published Copyright TCG Specification Version 1.0 Revision January 2018 Published TCG Platform Attribute Credential Profile Revision 16 16 January 2018 Published Contact: admin@trustedcomputinggroup.org TCG Published Copyright TCG 2018 TCG Copyright TCG 2018 TCG Platform Attribute Credential

More information

TCG Infrastructure Working Group Core Integrity Schema Specification

TCG Infrastructure Working Group Core Integrity Schema Specification TCG Infrastructure Working Group Core Integrity Schema Specification Revision 1.0 17 November 2006 FINAL Contacts: ned.smith@intel.com (Co-Chair, Editor) THardjono@SignaCert.com (Co-Chair) TCG Copyright

More information

Metadata for SAML 1.0 Web Browser Profiles

Metadata for SAML 1.0 Web Browser Profiles 1 2 3 4 Metadata for SAML 1.0 Web Browser Profiles Working Draft 01, 1 February 2003 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Document identifier: draft-sstc-saml-meta-data-01

More information

Web Services Resource Metadata 1.0 (WS-ResourceMetadataDescriptor)

Web Services Resource Metadata 1.0 (WS-ResourceMetadataDescriptor) 1 2 3 4 Web Services Resource Metadata 1.0 (WS-ResourceMetadataDescriptor) Committee Specification 01, November 9, 2006 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Document identifier:

More information

[MS-OXWSMSHR]: Folder Sharing Web Service Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-OXWSMSHR]: Folder Sharing Web Service Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-OXWSMSHR]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-OXSHRMSG]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

QosPolicyHolder 1.0. For UPnP Version Date: March 10th, 2005

QosPolicyHolder 1.0. For UPnP Version Date: March 10th, 2005 QosPolicyHolder 1.0 For UPnP Version 1.0 2 Date: March 10th, 2005 This Standardized DCP has been adopted as a Standardized DCP by the Steering Committee of the UPnP Forum, pursuant to Section 2.1(c)(ii)

More information

TED schemas. Governance and latest updates

TED schemas. Governance and latest updates TED schemas Governance and latest updates Enric Staromiejski Torregrosa Carmelo Greco 9 October 2018 Agenda 1. Objectives 2. Scope 3. TED XSD 3.0.0 Technical harmonisation of all TED artefacts Code lists

More information

SAML V2.0 Profile for Mandator Credentials

SAML V2.0 Profile for Mandator Credentials 2 SAML V2.0 Profile for Mandator Credentials 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Specification URIs: This Version: Previous Version: Latest Version: Technical

More information

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Guidance for Requirements for qualified trust service providers: trustworthy systems and products Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there

More information

SAML V2.0 Profile for Token Correlation

SAML V2.0 Profile for Token Correlation SAML V2.0 Profile for Token Correlation Committee Draft 01 28 June 2010 Specification URIs: This Version: 0.1 Previous Version: 0 Latest Version: Technical Committee: OASIS Security Services TC Chair(s):

More information

SDLC INTELLECTUAL PROPERTY POLICY

SDLC INTELLECTUAL PROPERTY POLICY SDLC INTELLECTUAL PROPERTY POLICY Last Revised: 11/14/17 1. Introduction. This Intellectual Property Policy ( Policy ) governs intellectual property rights of the SDL Consortium ( SDLC ) and its Members

More information

Certification Report

Certification Report EAL 3 Evaluation of Thales Communications S. A. Internal Communications Management System (ICMS) Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation

More information

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

XEP-0009: Jabber-RPC

XEP-0009: Jabber-RPC XEP-0009: Jabber-RPC DJ Adams mailto:dj.adams@pobox.com xmpp:dj@gnu.mine.nu 2011-11-10 Version 2.2 Status Type Short Name Final Standards Track jabber-rpc This specification defines an XMPP protocol extension

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

TCG. TCG Storage Interface Interactions Specification. Specification Version 1.0. January 27, Contacts:

TCG. TCG Storage Interface Interactions Specification. Specification Version 1.0. January 27, Contacts: TCG Storage Interface Interactions Specification January 27, 2009 Contacts: storagewg@trustedcomputinggroup.org Copyright TCG 2009 TCG Copyright 2009 Trusted Computing Group, Incorporated. Disclaimer,

More information

XEP-0357: Push Notifications

XEP-0357: Push Notifications XEP-0357: Push Notifications Kevin Smith mailto:kevin@kismith.co.uk xmpp:kevin@doomsong.co.uk Lance Stout mailto:lance@andyet.com xmpp:lance@lance.im 2017-08-24 Version 0.3 Status Type Short Name Experimental

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB)

More information

TCG. SNMP MIB for TPM-Based Attestation

TCG. SNMP MIB for TPM-Based Attestation SNMP MIB for TPM-Based Attestation Specification Version 0.8 Revision 0.02 May 22, 2018 DRAFT Contact: admin@trustedcomputinggroup.org Work in Progress This document is an intermediate draft for comment

More information

Intellectual Property Rights Notice for Open Specifications Documentation

Intellectual Property Rights Notice for Open Specifications Documentation [MS-MSL-Diff]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

XEP-0293: Jingle RTP Feedback Negotiation

XEP-0293: Jingle RTP Feedback Negotiation XEP-0293: Jingle RTP Feedback Negotiation Olivier Crête mailto:olivier.crete@collabora.co.uk xmpp:olivier.crete@collabora.co.uk 2015-08-11 Version 1.0 Status Type Short Name Draft Standards Track NOT_YET_ASSIGNED

More information

Oracle Enterprise Data Quality

Oracle Enterprise Data Quality Oracle Enterprise Data Quality Automated Loading and Running of Projects Version 9.0 January 2012 Copyright 2006, 2012, Oracle and/or its affiliates. All rights reserved. Oracle Enterprise Data Quality,

More information

TCG Specification TCG. TPM 2.0 Mobile Command Response Buffer Interface. TCG Published. Family 2.0. Level 00 Revision 12.

TCG Specification TCG. TPM 2.0 Mobile Command Response Buffer Interface. TCG Published. Family 2.0. Level 00 Revision 12. TCG Specification TPM 2.0 Mobile Command Response Buffer Interface Family 2.0 Level 00 Revision 12 16 December 2014 Contact: admin@trustedcomputinggroup.org TCG Published Copyright TCG 2014 TCG Copyright

More information

TCG. TCG Infrastructure Working Group Core Integrity Schema Specification. TCG Published Copyright TCG 2011

TCG. TCG Infrastructure Working Group Core Integrity Schema Specification. TCG Published Copyright TCG 2011 TCG Infrastructure Working Group Core Integrity Schema Specification Specification Version 2.0 Revision 5 August 24, 2011 PUBLISHED Contact: admin@trustedcomputinggroup.org TCG Published Copyright TCG

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Altova XMLSpy 2007 Tutorial

Altova XMLSpy 2007 Tutorial Tutorial All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage

More information

[MS-TMPLDISC]: Template Discovery Web Service Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-TMPLDISC]: Template Discovery Web Service Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-TMPLDISC]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell Data Protection Encryption Personal Edition Version 8.14.0 383-4-416 2 October 2017 v1.1 Government of Canada. This document is the property of the Government

More information

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 01 23 November 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono ( hardjono@mit.edu

More information

Trustmark Framework Technical Specification

Trustmark Framework Technical Specification Trustmark Framework Technical Specification Version 1.2 November 6, 2017 Published by the Georgia Tech Research Institute under the Trustmark Initiative https://trustmarkinitiative.org/ Table of Contents

More information

XML Security Derived Keys

XML Security Derived Keys http://www.w3.org/tr/2009/wd-xmlsec-deriv... 1 3/28/2009 11:33 AM XML Security Derived Keys W3C Working Draft 26 February 2009 This version: http://www.w3.org/tr/2009/wd-xmlsec-derivedkeys-20090226/ Latest

More information

Getting Started with MTConnect: Architecture

Getting Started with MTConnect: Architecture Institute Getting Started with : Architecture Draft 1 9/25/2012 Specifications or Materials AMT - The Association For Manufacturing Technology ( AMT ) owns the copyright in this Specification or Material.

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT McAfee Policy Auditor 6.4 with epolicy Orchestrator 5.10 5 November 2018 383-4-455 V1.0 Government of Canada. This document is the property of the Government of Canada.

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Lexmark CX920, CX921, CX922, CX923, CX924, XC9235, XC9245, XC9255, and XC9265 Multi-Function Printers 7 February 2018 383-4-434 V1.0 Government of Canada. This document

More information

OpenFlow Switch Errata

OpenFlow Switch Errata OpenFlow Switch Errata Version 1.0.2 November 1, 2013 ONF TS-013 Disclaimer THIS SPECIFICATION IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT,

More information

Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On

Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Configuration Guide E84772-01 Last Update: Monday, October 09, 2017 Oracle Utilities Opower Energy Efficiency Web Portal -

More information

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 01 23 November 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono ( hardjono@mit.edu

More information

ONVIF Advanced Security Client Test Specification

ONVIF Advanced Security Client Test Specification ONVIF Advanced Security Client Test Specification Version 17.06 June 2017 www.onvif.org 2017 ONVIF, Inc. All rights reserved. Recipients of this document may copy, distribute, publish, or display this

More information

XEP-0130: Waiting Lists

XEP-0130: Waiting Lists XEP-0130: Waiting Lists Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ Alexandre Nolle mailto:anolle@francetelecom.com Mark Troyer mailto:mtroyer@jabber.com xmpp:mtroyer@corp.jabber.com

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-OXWSMSHR]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

Request for Comments: TIS Labs March Storing Certificates in the Domain Name System (DNS)

Request for Comments: TIS Labs March Storing Certificates in the Domain Name System (DNS) Network Working Group Request for Comments: 2538 Category: Standards Track D. Eastlake IBM O. Gudmundsson TIS Labs March 1999 Status of this Memo Storing Certificates in the Domain Name System (DNS) This

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

XEP-0206: XMPP Over BOSH

XEP-0206: XMPP Over BOSH 1 di 15 31/01/2011 19:39 XEP-0206: XMPP Over BOSH Abstract: Authors: Copyright: Status: Type: This specification defines how the Bidirectional-streams Over Synchronous HTTP (BOSH) technology can be used

More information

OCF 2.0 Clarify OCF CPLAttributes Extension, Section X, add Security OIDs, remove credid, update security profiles - Security WG CR 2529/2549

OCF 2.0 Clarify OCF CPLAttributes Extension, Section X, add Security OIDs, remove credid, update security profiles - Security WG CR 2529/2549 Template version: 1.2 page 1 OCF 2.0 Clarify OCF CPLAttributes Extension, Section 9.3.2.1.X, add Security OIDs, remove credid, update security profiles - Security WG CR 2529/2549 Legal Disclaimer THIS

More information

Entrust WAP Server Certificate Relying Party Agreement

Entrust WAP Server Certificate Relying Party Agreement Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further

More information

Abstract Code-Signing Profile of the OASIS Digital Signature Services

Abstract Code-Signing Profile of the OASIS Digital Signature Services 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Abstract Code-Signing Profile of the OASIS Digital Signature Services OASIS Standard 11 April 2007 Specification

More information

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0

SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 03 9 December 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono (hardjono@mit.edu),

More information

IBM. IBM i2 Analyze Data Acquisition Guide. Version 4 Release 0

IBM. IBM i2 Analyze Data Acquisition Guide. Version 4 Release 0 IBM IBM i2 Analyze Data Acquisition Guide Version 4 Release 0 Note Before using this information and the product it supports, read the information in Notices on page 29. This edition applies to version

More information

Certification Report

Certification Report Certification Report EMC NetWorker v8.0.1.4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada,

More information

Test Assertions Part 2 - Test Assertion Markup Language Version 1.0

Test Assertions Part 2 - Test Assertion Markup Language Version 1.0 Test Assertions Part 2 - Test Assertion Markup Language Version 1.0 Draft 1.0.2 6 January 2010 Specification URIs: This Version: Previous Version: [NA] Latest Version: http://docs.oasis-open.org/tag/taml/v1.0/testassertionmarkuplanguage-1.0.html

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

XML Schema. Mario Alviano A.Y. 2017/2018. University of Calabria, Italy 1 / 28

XML Schema. Mario Alviano A.Y. 2017/2018. University of Calabria, Italy 1 / 28 1 / 28 XML Schema Mario Alviano University of Calabria, Italy A.Y. 2017/2018 Outline 2 / 28 1 Introduction 2 Elements 3 Simple and complex types 4 Attributes 5 Groups and built-in 6 Import of other schemes

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet G2 Gateway product Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

TS SIGNATURE VALIDATION REPORT

TS SIGNATURE VALIDATION REPORT TS 119 102 2 SIGNATURE VALIDATION REPORT An introduction Presented by Peter Lipp for the esignature and eseal validation workshop, Jan 10 2018 Agenda Scope Relation to EN 319 102 1 Approach Report structure

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT WorkCentre 7525/7530/7535/7545/7556 with FIPS 140-2 Compliance over SNMPv3 25 July 2016 v1.0 383-4-371 Government of Canada. This document is the property of the Government

More information

[MS-QDEFF]: Query Definition File Format. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-QDEFF]: Query Definition File Format. Intellectual Property Rights Notice for Open Specifications Documentation [MS-QDEFF]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

XEP-0337: Event Logging over XMPP

XEP-0337: Event Logging over XMPP XEP-0337: Event Logging over XMPP Peter Waher mailto:peterwaher@hotmail.com xmpp:peter.waher@jabber.org http://www.linkedin.com/in/peterwaher 2017-09-11 Version 0.3 Status Type Short Name Deferred Standards

More information

Web Services Description Language (WSDL) Version 1.2

Web Services Description Language (WSDL) Version 1.2 Web Services Description Language (WSDL) Version 1.2 Web Services Description Language (WSDL) Version 1.2 W3C Working Draft 24 January 2003 This version: http://www.w3.org/tr/2003/wd-wsdl12-20030124 Latest

More information

CA File Master Plus. Release Notes. Version

CA File Master Plus. Release Notes. Version CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

D-Cinema Packaging Caption and Closed Subtitle

D-Cinema Packaging Caption and Closed Subtitle SMPTE STANDARD SMPTE 429-12-2008 D-Cinema Packaging Caption and Closed Subtitle Page 1 of 11 pages Table of Contents Page Foreword... 2 Intellectual Property... 2 1 Scope... 3 2 Conformance Notation...

More information

[MS-OXWSSYNC]: Mailbox Contents Synchronization Web Service Protocol Specification

[MS-OXWSSYNC]: Mailbox Contents Synchronization Web Service Protocol Specification [MS-OXWSSYNC]: Mailbox Contents Synchronization Web Service Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes

More information